Analysis
-
max time kernel
130s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-11-2021 08:42
Static task
static1
Behavioral task
behavioral1
Sample
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe
Resource
win10-en-20211014
General
-
Target
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe
-
Size
1.4MB
-
MD5
b4ebbc92b9c6aea78e9b797e9365d61b
-
SHA1
3046ac629e1b298d7af16d0a52d529e165723ae6
-
SHA256
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470
-
SHA512
58bb1d4bf282bbe18c51b13bb7a4a1a23b75c9fa75541f2a202b4c02a4b64f7ce48d5d08f0f07dba9b4a8e3052565bbadf27d60d4a528dfd6971457fcae79a24
Malware Config
Extracted
redline
@zhilsholi
nariviqusir.xyz:81
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/952-168-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/952-173-0x0000000000418F0E-mapping.dmp family_redline behavioral1/memory/952-182-0x0000000008EF0000-0x00000000094F6000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2224 created 2752 2224 WerFault.exe c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
fl.exeservices.exesihost64.exepid process 2128 fl.exe 2260 services.exe 868 sihost64.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exedescription pid process target process PID 2752 set thread context of 952 2752 c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2224 2752 WerFault.exe c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
WerFault.exeAppLaunch.exepowershell.exepowershell.exefl.exepowershell.exepowershell.exeservices.exepid process 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 952 AppLaunch.exe 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe 2864 powershell.exe 2864 powershell.exe 2864 powershell.exe 2128 fl.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 1268 powershell.exe 1268 powershell.exe 1268 powershell.exe 2260 services.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exeAppLaunch.exepowershell.exepowershell.exefl.exepowershell.exedescription pid process Token: SeRestorePrivilege 2224 WerFault.exe Token: SeBackupPrivilege 2224 WerFault.exe Token: SeDebugPrivilege 2224 WerFault.exe Token: SeDebugPrivilege 952 AppLaunch.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeIncreaseQuotaPrivilege 3264 powershell.exe Token: SeSecurityPrivilege 3264 powershell.exe Token: SeTakeOwnershipPrivilege 3264 powershell.exe Token: SeLoadDriverPrivilege 3264 powershell.exe Token: SeSystemProfilePrivilege 3264 powershell.exe Token: SeSystemtimePrivilege 3264 powershell.exe Token: SeProfSingleProcessPrivilege 3264 powershell.exe Token: SeIncBasePriorityPrivilege 3264 powershell.exe Token: SeCreatePagefilePrivilege 3264 powershell.exe Token: SeBackupPrivilege 3264 powershell.exe Token: SeRestorePrivilege 3264 powershell.exe Token: SeShutdownPrivilege 3264 powershell.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeSystemEnvironmentPrivilege 3264 powershell.exe Token: SeRemoteShutdownPrivilege 3264 powershell.exe Token: SeUndockPrivilege 3264 powershell.exe Token: SeManageVolumePrivilege 3264 powershell.exe Token: 33 3264 powershell.exe Token: 34 3264 powershell.exe Token: 35 3264 powershell.exe Token: 36 3264 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeIncreaseQuotaPrivilege 2864 powershell.exe Token: SeSecurityPrivilege 2864 powershell.exe Token: SeTakeOwnershipPrivilege 2864 powershell.exe Token: SeLoadDriverPrivilege 2864 powershell.exe Token: SeSystemProfilePrivilege 2864 powershell.exe Token: SeSystemtimePrivilege 2864 powershell.exe Token: SeProfSingleProcessPrivilege 2864 powershell.exe Token: SeIncBasePriorityPrivilege 2864 powershell.exe Token: SeCreatePagefilePrivilege 2864 powershell.exe Token: SeBackupPrivilege 2864 powershell.exe Token: SeRestorePrivilege 2864 powershell.exe Token: SeShutdownPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeSystemEnvironmentPrivilege 2864 powershell.exe Token: SeRemoteShutdownPrivilege 2864 powershell.exe Token: SeUndockPrivilege 2864 powershell.exe Token: SeManageVolumePrivilege 2864 powershell.exe Token: 33 2864 powershell.exe Token: 34 2864 powershell.exe Token: 35 2864 powershell.exe Token: 36 2864 powershell.exe Token: SeDebugPrivilege 2128 fl.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeIncreaseQuotaPrivilege 2520 powershell.exe Token: SeSecurityPrivilege 2520 powershell.exe Token: SeTakeOwnershipPrivilege 2520 powershell.exe Token: SeLoadDriverPrivilege 2520 powershell.exe Token: SeSystemProfilePrivilege 2520 powershell.exe Token: SeSystemtimePrivilege 2520 powershell.exe Token: SeProfSingleProcessPrivilege 2520 powershell.exe Token: SeIncBasePriorityPrivilege 2520 powershell.exe Token: SeCreatePagefilePrivilege 2520 powershell.exe Token: SeBackupPrivilege 2520 powershell.exe Token: SeRestorePrivilege 2520 powershell.exe Token: SeShutdownPrivilege 2520 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeSystemEnvironmentPrivilege 2520 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exeAppLaunch.exefl.execmd.execmd.execmd.exeservices.execmd.exesihost64.exedescription pid process target process PID 2752 wrote to memory of 952 2752 c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe AppLaunch.exe PID 2752 wrote to memory of 952 2752 c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe AppLaunch.exe PID 2752 wrote to memory of 952 2752 c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe AppLaunch.exe PID 2752 wrote to memory of 952 2752 c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe AppLaunch.exe PID 2752 wrote to memory of 952 2752 c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe AppLaunch.exe PID 952 wrote to memory of 2128 952 AppLaunch.exe fl.exe PID 952 wrote to memory of 2128 952 AppLaunch.exe fl.exe PID 2128 wrote to memory of 1728 2128 fl.exe cmd.exe PID 2128 wrote to memory of 1728 2128 fl.exe cmd.exe PID 1728 wrote to memory of 3264 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 3264 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 2864 1728 cmd.exe powershell.exe PID 1728 wrote to memory of 2864 1728 cmd.exe powershell.exe PID 2128 wrote to memory of 2000 2128 fl.exe cmd.exe PID 2128 wrote to memory of 2000 2128 fl.exe cmd.exe PID 2000 wrote to memory of 1976 2000 cmd.exe schtasks.exe PID 2000 wrote to memory of 1976 2000 cmd.exe schtasks.exe PID 2128 wrote to memory of 2208 2128 fl.exe cmd.exe PID 2128 wrote to memory of 2208 2128 fl.exe cmd.exe PID 2208 wrote to memory of 2260 2208 cmd.exe services.exe PID 2208 wrote to memory of 2260 2208 cmd.exe services.exe PID 2260 wrote to memory of 508 2260 services.exe cmd.exe PID 2260 wrote to memory of 508 2260 services.exe cmd.exe PID 508 wrote to memory of 2520 508 cmd.exe powershell.exe PID 508 wrote to memory of 2520 508 cmd.exe powershell.exe PID 508 wrote to memory of 1268 508 cmd.exe powershell.exe PID 508 wrote to memory of 1268 508 cmd.exe powershell.exe PID 2260 wrote to memory of 868 2260 services.exe sihost64.exe PID 2260 wrote to memory of 868 2260 services.exe sihost64.exe PID 868 wrote to memory of 1540 868 sihost64.exe conhost.exe PID 868 wrote to memory of 1540 868 sihost64.exe conhost.exe PID 868 wrote to memory of 1540 868 sihost64.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe"C:\Users\Admin\AppData\Local\Temp\c23b096fdd5379aeaee9a28e4561143596fe1c7d32555f915a69725c99fba470.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fl.exe"C:\Users\Admin\AppData\Local\Temp\fl.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exeC:\Users\Admin\AppData\Local\Temp\Microsoft\services.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "wkoiucolsmt"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 5362⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
7c540567d0a811924123193b4965b5a7
SHA1e1e3714d9f89f74d7bd5cf820803283831163efb
SHA256107eeab7125978cf5d3df40ad2018f8c3047bd9f02c24a3d58de2dd46a1b6c3e
SHA512a6b781e233ca25a2a368d8ff4e0bb4ad1b34fbd07aa91d9a42f7f47c3a6f4efeb5ac054d6646e2785955a4320959a6e06552eb834513cc80d6d6c143a83f37c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
408bb1372a2b9604d161d11f04b7dc06
SHA168b5cbe6dd246739baac2f12d2d762e0f79729ac
SHA2562c139d6a4d7e18f118256f675547f4da998d33291b577de79934a7deb278d3e1
SHA512757c6d0d45d7d3d94f609b92117fb56767d3566559b14ba11836a16133d46c2169de2ddfb23d8f7f382c7acafab9cfc58b70647239caa33ffbddc5970fb26846
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
20f794db4eae9b36d939f270cafc7914
SHA1cbf1c61cbe3b4b69dd319741335f7bc784ae1b1e
SHA256315ba3d4f279a6a195942062718e4cbce1f059b623a7104488699f376cc5df88
SHA512f26a6a0ee756d73806797a56c5301dbe1258adf1dc8ed49fd219699f73e37c0d043fd0c64bbd4819df9581f6cc411fe4ed873e7742111c3a61b121576c0eb721
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exeMD5
ff8b99f5110d71535d12de2a8e4f233b
SHA12f6976308c3e7ff07f6f9c054fdcecccae952c53
SHA256792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca
SHA5122fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\services.exeMD5
ff8b99f5110d71535d12de2a8e4f233b
SHA12f6976308c3e7ff07f6f9c054fdcecccae952c53
SHA256792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca
SHA5122fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b
-
C:\Users\Admin\AppData\Local\Temp\fl.exeMD5
ff8b99f5110d71535d12de2a8e4f233b
SHA12f6976308c3e7ff07f6f9c054fdcecccae952c53
SHA256792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca
SHA5122fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b
-
C:\Users\Admin\AppData\Local\Temp\fl.exeMD5
ff8b99f5110d71535d12de2a8e4f233b
SHA12f6976308c3e7ff07f6f9c054fdcecccae952c53
SHA256792ce771992574a19de9c71aa3dc3f2eb1883a866590d734b876159aff119eca
SHA5122fe3440a98f39a7690a6559f9d95a34e4c971a23b431f52380e565ab8b03c172bdc598fe245039732473bc5c5fcce6919c8b1ce21b7d5a5d11a8fb0fcc1c443b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exeMD5
4f54d5ccd5a39d00354753bd4a4aec1c
SHA14360174c4dd27e25cde39c73725ce8c44de835a9
SHA256e8a351c3b019117e26f3ba9862db37ea5ae4baf03f29b9b1c3a5dabd581e1b04
SHA512e2465b355d035cd6f78d07f4cdcc368a14e55602b6c09c5ae1d91e0fc24e41695e9cadcf3d31f02ba4a31212652f06fc2a0abea0f32d3f01cc686ff46f874216
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exeMD5
4f54d5ccd5a39d00354753bd4a4aec1c
SHA14360174c4dd27e25cde39c73725ce8c44de835a9
SHA256e8a351c3b019117e26f3ba9862db37ea5ae4baf03f29b9b1c3a5dabd581e1b04
SHA512e2465b355d035cd6f78d07f4cdcc368a14e55602b6c09c5ae1d91e0fc24e41695e9cadcf3d31f02ba4a31212652f06fc2a0abea0f32d3f01cc686ff46f874216
-
memory/508-580-0x0000000000000000-mapping.dmp
-
memory/868-678-0x0000000000000000-mapping.dmp
-
memory/952-200-0x000000000AF10000-0x000000000AF11000-memory.dmpFilesize
4KB
-
memory/952-189-0x000000000A080000-0x000000000A081000-memory.dmpFilesize
4KB
-
memory/952-173-0x0000000000418F0E-mapping.dmp
-
memory/952-174-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/952-175-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/952-201-0x000000000B610000-0x000000000B611000-memory.dmpFilesize
4KB
-
memory/952-168-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/952-195-0x000000000A660000-0x000000000A661000-memory.dmpFilesize
4KB
-
memory/952-192-0x000000000A440000-0x000000000A441000-memory.dmpFilesize
4KB
-
memory/952-191-0x000000000A740000-0x000000000A741000-memory.dmpFilesize
4KB
-
memory/952-190-0x000000000A1A0000-0x000000000A1A1000-memory.dmpFilesize
4KB
-
memory/952-176-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/952-185-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/952-184-0x0000000009000000-0x0000000009001000-memory.dmpFilesize
4KB
-
memory/952-183-0x0000000008FC0000-0x0000000008FC1000-memory.dmpFilesize
4KB
-
memory/952-182-0x0000000008EF0000-0x00000000094F6000-memory.dmpFilesize
6.0MB
-
memory/952-181-0x0000000009090000-0x0000000009091000-memory.dmpFilesize
4KB
-
memory/952-180-0x0000000008F60000-0x0000000008F61000-memory.dmpFilesize
4KB
-
memory/952-179-0x0000000009500000-0x0000000009501000-memory.dmpFilesize
4KB
-
memory/952-177-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/1268-631-0x0000000000000000-mapping.dmp
-
memory/1728-473-0x0000000000000000-mapping.dmp
-
memory/1976-571-0x0000000000000000-mapping.dmp
-
memory/2000-570-0x0000000000000000-mapping.dmp
-
memory/2128-481-0x000000001B7A6000-0x000000001B7A7000-memory.dmpFilesize
4KB
-
memory/2128-465-0x0000000000000000-mapping.dmp
-
memory/2128-480-0x000000001B7A3000-0x000000001B7A5000-memory.dmpFilesize
8KB
-
memory/2128-479-0x000000001B7A0000-0x000000001B7A2000-memory.dmpFilesize
8KB
-
memory/2128-469-0x00000000009F0000-0x0000000000BE5000-memory.dmpFilesize
2.0MB
-
memory/2208-573-0x0000000000000000-mapping.dmp
-
memory/2260-598-0x000000001BD02000-0x000000001BD03000-memory.dmpFilesize
4KB
-
memory/2260-574-0x0000000000000000-mapping.dmp
-
memory/2520-581-0x0000000000000000-mapping.dmp
-
memory/2752-133-0x0000000002780000-0x0000000002781000-memory.dmpFilesize
4KB
-
memory/2752-160-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/2752-158-0x0000000002A30000-0x0000000002A31000-memory.dmpFilesize
4KB
-
memory/2752-163-0x0000000002A80000-0x0000000002A81000-memory.dmpFilesize
4KB
-
memory/2752-164-0x00000000027E0000-0x00000000027E1000-memory.dmpFilesize
4KB
-
memory/2752-165-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2752-166-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2752-167-0x0000000000400000-0x00000000007C1000-memory.dmpFilesize
3.8MB
-
memory/2752-151-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-150-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-149-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-148-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-146-0x00000000028C0000-0x00000000028C1000-memory.dmpFilesize
4KB
-
memory/2752-147-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/2752-144-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/2752-145-0x00000000028D0000-0x00000000028D1000-memory.dmpFilesize
4KB
-
memory/2752-143-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/2752-141-0x00000000028E0000-0x00000000028E1000-memory.dmpFilesize
4KB
-
memory/2752-142-0x00000000028F0000-0x00000000028F1000-memory.dmpFilesize
4KB
-
memory/2752-140-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-139-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-138-0x00000000027D0000-0x00000000027D1000-memory.dmpFilesize
4KB
-
memory/2752-137-0x00000000027B0000-0x00000000027B1000-memory.dmpFilesize
4KB
-
memory/2752-136-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/2752-135-0x0000000002740000-0x0000000002741000-memory.dmpFilesize
4KB
-
memory/2752-134-0x0000000002790000-0x0000000002791000-memory.dmpFilesize
4KB
-
memory/2752-152-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-132-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-131-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-130-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-161-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2752-162-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2752-129-0x0000000003670000-0x0000000003671000-memory.dmpFilesize
4KB
-
memory/2752-116-0x0000000000400000-0x00000000007C1000-memory.dmpFilesize
3.8MB
-
memory/2752-159-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/2752-157-0x0000000002A70000-0x0000000002A71000-memory.dmpFilesize
4KB
-
memory/2752-115-0x0000000000400000-0x00000000007C1000-memory.dmpFilesize
3.8MB
-
memory/2752-117-0x0000000000400000-0x00000000007C1000-memory.dmpFilesize
3.8MB
-
memory/2752-118-0x00000000025A0000-0x0000000002600000-memory.dmpFilesize
384KB
-
memory/2752-119-0x0000000000400000-0x00000000007C1000-memory.dmpFilesize
3.8MB
-
memory/2752-120-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/2752-128-0x0000000003680000-0x0000000003681000-memory.dmpFilesize
4KB
-
memory/2752-127-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB
-
memory/2752-153-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2752-121-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/2752-154-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/2752-123-0x00000000029C0000-0x00000000029C1000-memory.dmpFilesize
4KB
-
memory/2752-126-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/2752-125-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/2752-124-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/2752-156-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2752-155-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/2752-122-0x0000000002950000-0x0000000002951000-memory.dmpFilesize
4KB
-
memory/2864-572-0x000001F1DF4D8000-0x000001F1DF4D9000-memory.dmpFilesize
4KB
-
memory/2864-561-0x000001F1DF4D6000-0x000001F1DF4D8000-memory.dmpFilesize
8KB
-
memory/2864-560-0x000001F1DF4D3000-0x000001F1DF4D5000-memory.dmpFilesize
8KB
-
memory/2864-557-0x000001F1DF4D0000-0x000001F1DF4D2000-memory.dmpFilesize
8KB
-
memory/2864-522-0x0000000000000000-mapping.dmp
-
memory/3264-556-0x0000026FEAFC8000-0x0000026FEAFC9000-memory.dmpFilesize
4KB
-
memory/3264-495-0x0000026FEAFC6000-0x0000026FEAFC8000-memory.dmpFilesize
8KB
-
memory/3264-483-0x0000026FEAFC3000-0x0000026FEAFC5000-memory.dmpFilesize
8KB
-
memory/3264-482-0x0000026FEAFC0000-0x0000026FEAFC2000-memory.dmpFilesize
8KB
-
memory/3264-474-0x0000000000000000-mapping.dmp